WHAT IS VPN ?


WHAT IS VPN ?



A Virtual Private Network (VPN) is a network technology that creates a secure network connection on a public network such as the Internet or a private network owned by a service provider. Large companies, educational institutions, and government agencies use VPN technology to enable remote users to securely connect to private networks.

VPNs can connect multiple sites over large distances like a wide area network (WAN). VPNs are often used to extend intranets around the world to disseminate information and news to a wide range of user groups. Educational institutions using VPN connections can be distributed throughout the country or around the world.

To access the private network, the user must be authenticated using a unique identification and password. Authentication tokens are typically used to access a private network by a personal identification number (PIN) that the user must enter. A PIN is a unique authentication code that varies according to a particular frequency, typically around 30 seconds.

protocol


There are many VPN protocols in use, and they protect the transmission of data traffic through the public network infrastructure. Each protocol has a slightly different way of maintaining data security.

IP Security (IPSec) is used to protect communications over the Internet. IPSec traffic can use transport mode or tunnel to encrypt data traffic in a VPN. The difference between the two modes is that the transmission mode only encrypts the messages in the data packets (also known as payloads) and the tunnel encrypts the entire data packets. IPSec is often referred to as a "security override" because it is used as a security layer for other protocols.

Secure Sockets Layer (SSL) and Transport Layer Security (TLS) use encryption to protect communications over the Internet. The two protocols use a & quote; handshake & quote; authentication method, which involves negotiation of network parameters between the client and the server machine. To successfully initiate a connection, an authentication procedure involving a certificate is used. A certificate is an encryption key that is stored on the server and the client.

Point-to-Point Tunneling Protocol (PPTP) is another type of tunnelling protocol used to connect remote clients to a dedicated server over the Internet. PPTP is one of the most widely used VPN protocols because it is directly configured and maintained, and because it is included in the Windows operating system.

Layer 2 Tunneling Protocol (L2TP) is a protocol for tunnelling data traffic between two sites over the Internet. L2TP is typically used in tandem with IPSec, which acts as a security layer, to ensure that L2TP data packets are transmitted over the Internet. Unlike PPTP, VPN implementations that use L2TP / IPSec require shared keys or certificates.

VPN technology uses sophisticated encryption to ensure security and prevent any accidental interception of data between private sites. All traffic on the VPN is encrypted using an algorithm to ensure data integrity and privacy. VPN architecture is governed by a set of strict rules and standards to ensure dedicated communication channels between sites. The corporate network administrator is responsible for determining the scope of VPNs, implementing and deploying VPNs, and continuously monitoring network traffic on the network firewall. VPNs require administrators to continually understand the overall architecture and scope of VPNs to ensure that communications remain private.

Advantages Disadvantages


VPN is a cheap and effective way to build a private network. Using the Internet as the primary communication channel between sites is a cost-effective alternative to expensive leased private lines. The cost of the company includes the network authentication hardware and software used to authenticate the user and any additional mechanisms such as authentication tokens or other security devices. Compared to leased lines, VPN configuration is relatively easy, speed and flexibility make the VPN a good choice for companies that need flexibility. For example, companies can adjust the number of sites in a VPN to meet changing needs.

There are several potential drawbacks to using VPN. Lack of Quality of Service (QoS) management on the Internet can result in packet loss and other performance issues. Unfavourable network conditions that occur outside the private network are not under the control of the VPN administrator. For this reason, many large companies pay for using trusted VPNs using private networks to guarantee QoS. Vendor interoperability is another potential drawback because VPN technology from one vendor may not be compatible with VPN technology from another vendor. These shortcomings can not prevent the wide acceptance of VPN technology and deployment.

Comments